Singapore Summit : Cybersecurity Conference
In-person Summit July 11, 2023
Cybersecurity leaders say Southeast Asia has become a hotbed for cybercrime activities. In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission. In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG's cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more. You can also earn your CPE credits by attending the summit. ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
View Agenda
OT and IT Convergence: Measuring the Security Risks

Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. 

As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?  Can you deploy suitable asset inventory methods and map the IT/OT risks? 

This session will cover:  

  • Building complete visibility and monitoring your IT and OT assets with the right access control 
  • Integrating OT threat monitoring into SoC for threat detection
  • Implementing essential steps to establish OT security
  • 10:00 AM
  • 10:29 AM
Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach

Where does the journey to “zero trust” begin and what are the common entry points for accessing data? Experts agree that “zero trust” is based on the “assume breach” premise that treats every asset as breached and all traffic as hostile.

The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?

The session will cover:  

  • How has the approach toward security changed as security perimeters disappear?
  • How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment?
  • 10:30 AM
  • 10:59 AM
Networking Break
  • 11:00 AM
  • 11:14 AM
Panel Discussion: Protecting Your Legacy Applications in Cloud and Building a Risk Management Program

Cloud computing brings a whole new level of autonomy and functionality to an organization, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications. 

The session will cover:  

  • Risks of moving legacy applications to the cloud 
  • Building an effective risk management program 
  • A holistic approach to protect cloud applications
  • 11:15 AM
  • 11:44 AM
Lunch
  • 12:45 PM
  • 01:29 PM
Fireside Chat: Two-Way Street: CEO and CISO Conversation on InfoSec From a Business Lens

When it comes to cybersecurity, the CEO matters. Today, CEOs are recognizing the CISO’s role because it includes revenue protection, brand resilience and employee security. Cyber is an operational and existential risk for a business. How senior management provides support can impact how well an organization is protected from pervasive cyberthreats. The goal is to make sure the CEO understands the threat well enough to be able to mitigate it. It is imperative to use business language and shift the conversation away from technology and cyber language. But 2023 will be the year for CEOs to ask their CISO "what more can we get from what we already have?" Maximizing the coverage and protection of your existing tools and team and not letting your guard down must be the focus in 2023. 

The session will cover: 

  • Experience sharing 
  • Criminal liability 
  • Bridging the gap of cost and investment in cybersecurity
  • 01:30 PM
  • 01:59 PM
Panel: Building a Cyber-Resilient Enterprise: Bringing the C-Suite and Board Along

Enterprises across the region are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and to support the digital economy.    

Can they align their strategy with business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? How to address the skill challenge? What needs to change, both tactically and strategically, to build a cyber-resilient organization?

  • 02:00 PM
  • 02:29 PM

Cybersecurity leaders say Southeast Asia has become a hotbed for cybercrime activities. In 2022, the region has experienced an increase in DDoS attacks, ransomware attacks, attacks against industrial control systems (ICS), business email compromises, and phishing attacks — the list is endless. The region must take a collaborative defense approach to respond to this new threat environment. The challenge for enterprises has been to ascertain how much risk they are willing to accept to accomplish their mission. In the hybrid and interconnected world, the noticeable change has been changing consumption patterns of security technologies, which require new ways to deploy frameworks. The enterprise’s success will depend on its endurance to balance offense and defense to mitigate these threats using the right tools, technologies, and best practices. To gain insights into how to establish a secure ecosystem in this dynamic world, attend ISMG's cybersecurity summit and explore diverse cybersecurity trends from ransomware to supply chain attacks, infrastructure security to automotive cybersecurity, endpoint security featuring AI, connected devices’ challenges, critical infrastructure vulnerabilities, ICS risk, crypto challenges, extended detection and response, cyber insurance, and more. You can also earn your CPE credits by attending the summit. ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

View Agenda
OT and IT Convergence: Measuring the Security Risks

Most OT systems are designed with little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission-critical for enterprise security. 

As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?  Can you deploy suitable asset inventory methods and map the IT/OT risks? 

This session will cover:  

  • Building complete visibility and monitoring your IT and OT assets with the right access control 
  • Integrating OT threat monitoring into SoC for threat detection
  • Implementing essential steps to establish OT security
  • 10:00 AM
  • 10:29 AM
Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach

Where does the journey to “zero trust” begin and what are the common entry points for accessing data? Experts agree that “zero trust” is based on the “assume breach” premise that treats every asset as breached and all traffic as hostile.

The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?

The session will cover:  

  • How has the approach toward security changed as security perimeters disappear?
  • How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment?
  • 10:30 AM
  • 10:59 AM
Networking Break
  • 11:00 AM
  • 11:14 AM
Panel Discussion: Protecting Your Legacy Applications in Cloud and Building a Risk Management Program

Cloud computing brings a whole new level of autonomy and functionality to an organization, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications. 

The session will cover:  

  • Risks of moving legacy applications to the cloud 
  • Building an effective risk management program 
  • A holistic approach to protect cloud applications
  • 11:15 AM
  • 11:44 AM
Lunch
  • 12:45 PM
  • 01:29 PM
Fireside Chat: Two-Way Street: CEO and CISO Conversation on InfoSec From a Business Lens

When it comes to cybersecurity, the CEO matters. Today, CEOs are recognizing the CISO’s role because it includes revenue protection, brand resilience and employee security. Cyber is an operational and existential risk for a business. How senior management provides support can impact how well an organization is protected from pervasive cyberthreats. The goal is to make sure the CEO understands the threat well enough to be able to mitigate it. It is imperative to use business language and shift the conversation away from technology and cyber language. But 2023 will be the year for CEOs to ask their CISO "what more can we get from what we already have?" Maximizing the coverage and protection of your existing tools and team and not letting your guard down must be the focus in 2023. 

The session will cover: 

  • Experience sharing 
  • Criminal liability 
  • Bridging the gap of cost and investment in cybersecurity
  • 01:30 PM
  • 01:59 PM
Panel: Building a Cyber-Resilient Enterprise: Bringing the C-Suite and Board Along

Enterprises across the region are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and to support the digital economy.    

Can they align their strategy with business priorities and rise to the expectations? What does digital innovation mean to security, and where is the disconnect? How to address the skill challenge? What needs to change, both tactically and strategically, to build a cyber-resilient organization?

  • 02:00 PM
  • 02:29 PM

Speaker Interviews

July 11, 2023

Singapore Summit : Cybersecurity Conference